-
1
-
-
77950128031
-
-
Android developer mailing list post. http://groups. google.com/group/ android-developers/browse-thread/thread/f87e6fce2b26db36.
-
Android developer mailing list post
-
-
-
2
-
-
77950152317
-
-
Scratchbox. http://www.scratchbox.org/.
-
Scratchbox
-
-
-
3
-
-
77950123842
-
-
home
-
Ubuntu home page. http://www.ubuntu.com/.
-
Ubuntu
-
-
-
4
-
-
84862917117
-
Developing and benchmarking native linux applications on android
-
L. Batyuk, A.-D. Schmidt, H.-G. Schmidt, A. Camtepe, and S. Albayrak. Developing and benchmarking native linux applications on android. In MobileWireless Middleware, Operating Systems, and Applications, 2009.
-
(2009)
MobileWireless Middleware, Operating Systems, and Applications
-
-
Batyuk, L.1
Schmidt, A.-D.2
Schmidt, H.-G.3
Camtepe, A.4
Albayrak, S.5
-
5
-
-
48749129898
-
On the effort to create smartphone worms in windows mobile
-
20-22 June
-
M. Becher, F. Freiling, and B. Leider. On the effort to create smartphone worms in windows mobile. In Information Assurance and Security Workshop, 2007. IAW '07. IEEE SMC, pages 199-206, 20-22 June 2007.
-
(2007)
Information Assurance and Security Workshop, 2007. IAW '07. IEEE SMC
, pp. 199-206
-
-
Becher, M.1
Freiling, F.2
Leider, B.3
-
6
-
-
36348979829
-
Epidemics of mobile worms
-
New Orleans, Louisiana, USA, IEEE Computer Society
-
Y. Bulygin. Epidemics of mobile worms. In Proceedings of the 26th IEEE International Performance Computing and Communications Conference, IPCCC 2007, April 11-13, 2007, New Orleans, Louisiana, USA, pages 475-478. IEEE Computer Society, 2007.
-
(2007)
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, IPCCC 2007, April 11-13, 2007
, pp. 475-478
-
-
Bulygin, Y.1
-
7
-
-
10944254818
-
Mobile phones as computing devices: The viruses are coming!
-
D. Dagon, T. Martin, and T. Starner. Mobile phones as computing devices: The viruses are coming! IEEE Pervasive Computing, 3(4):11-15, 2004.
-
(2004)
IEEE Pervasive Computing
, vol.3
, Issue.4
, pp. 11-15
-
-
Dagon, D.1
Martin, T.2
Starner, T.3
-
8
-
-
57349123036
-
Can you infect me now? malware propagation in mobile phone networks
-
Alexandira, Virginia, USA, nov, ACM
-
C. Fleizach, M. Liljienstam, P. Johansson, G. M. Voelker, and A. Mehes. Can you infect me now? malware propagation in mobile phone networks. In Proceedings of the 5th ACM Workshop on Recurring Malcode (WORM 2007), Alexandira, Virginia, USA, nov 2007. ACM.
-
(2007)
Proceedings of the 5th ACM Workshop on Recurring Malcode (WORM 2007)
-
-
Fleizach, C.1
Liljienstam, M.2
Johansson, P.3
Voelker, G.M.4
Mehes, A.5
-
11
-
-
33750733586
-
Malware goes mobile
-
November, November
-
M. Hypponen. Malware goes mobile. Scientific American, November 2006:70-77, November 2006.
-
(2006)
Scientific American
, pp. 70-77
-
-
Hypponen, M.1
-
12
-
-
10444252457
-
Mobile Phone Vulnerabilities: A New Generation of Malware
-
Sept
-
J. Jamaluddin, N. Zotou, R. Edwards, and P. Coulton. Mobile Phone Vulnerabilities: A New Generation of Malware. In Proceedings of the 2004 IEEE International Symposium on Consumer Electronics, pages 199-202, Sept. 2004.
-
(2004)
Proceedings of the 2004 IEEE International Symposium on Consumer Electronics
, pp. 199-202
-
-
Jamaluddin, J.1
Zotou, N.2
Edwards, R.3
Coulton, P.4
-
13
-
-
44649187943
-
Is it finally time to worry about mobile malware?
-
G. Lawton. Is it finally time to worry about mobile malware? Computer, 41(5):12-14, 2008.
-
(2008)
Computer
, vol.41
, Issue.5
, pp. 12-14
-
-
Lawton, G.1
-
14
-
-
18144370814
-
Mobile phones: The next frontier for hackers?
-
N. Leavitt. Mobile phones: The next frontier for hackers? IEEE Computer, 38(4):20-23, 2005.
-
(2005)
IEEE Computer
, vol.38
, Issue.4
, pp. 20-23
-
-
Leavitt, N.1
-
15
-
-
33748991180
-
Modeling epidemic spreading in mobile environments
-
New York, NY, USA, ACM Press
-
J. W. Mickens and B. D. Noble. Modeling epidemic spreading in mobile environments. In WiSe '05: Proceedings of the 4th ACM workshop on Wireless security, pages 77-86, New York, NY, USA, 2005. ACM Press.
-
(2005)
WiSe '05: Proceedings of the 4th ACM workshop on Wireless security
, pp. 77-86
-
-
Mickens, J.W.1
Noble, B.D.2
-
16
-
-
77950109715
-
Exploiting pocketpc, 2005
-
C. Mulliner. Exploiting pocketpc, 2005. Talk on WhatTheHack 2005, http://wiki.whatthehack.org/images/c/c0/Collinmulliner-wth2005-exploiting- pocketpc.pdf.
-
(2005)
Talk on WhatTheHack
-
-
Mulliner, C.1
-
18
-
-
77950103274
-
Exploiting symbian: Symbian exploitation and shellcode development, 2008
-
C. Mulliner. Exploiting symbian: Symbian exploitation and shellcode development, 2008. Talk on BlackHat Japan 2008, http://mulliner.org/symbian/ feed/CollinMulliner-Exploiting-Symbian-BlackHat-Japan-2008.pdf.
-
(2008)
Talk on BlackHat Japan
-
-
Mulliner, C.1
-
19
-
-
39049086351
-
Vulnerability Analysis of MMS User Agents
-
Washington, DC, USA, IEEE Computer Society
-
C. Mulliner and G. Vigna. Vulnerability Analysis of MMS User Agents. In ACSAC '06: Proceedings of the 22nd Annual Computer Security Applications Conference on Annual Computer Security Applications Conference, pages 77-88, Washington, DC, USA, 2006. IEEE Computer Society.
-
(2006)
ACSAC '06: Proceedings of the 22nd Annual Computer Security Applications Conference on Annual Computer Security Applications Conference
, pp. 77-88
-
-
Mulliner, C.1
Vigna, G.2
-
21
-
-
10644275203
-
Embedded devices next on the virus target list
-
Dec.-Jan
-
M. Piercy. Embedded devices next on the virus target list. IEE Electronics Systems and Software, 2:42-43, Dec.-Jan. 2004.
-
(2004)
IEE Electronics Systems and Software
, vol.2
, pp. 42-43
-
-
Piercy, M.1
-
22
-
-
67049128150
-
Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery
-
Baltimore, MD, Aug
-
R. Racic, D. Ma, and H. Chen. Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery. In Proceedings of the Second IEEE Communications Society / CreateNet International Conference on Security and Privacy in Communication Networks (SecureComm), Baltimore, MD, Aug. 2006.
-
(2006)
Proceedings of the Second IEEE Communications Society / CreateNet International Conference on Security and Privacy in Communication Networks (SecureComm)
-
-
Racic, R.1
Ma, D.2
Chen, H.3
-
23
-
-
77950125580
-
Malicious software for smartphones
-
02/08-01, Technische Universität Berlin, DAI-Labor, Feb. 2008
-
A. Schmidt and S. Albayrak. Malicious software for smartphones. Technical Report TUB-DAI 02/08-01, Technische Universität Berlin, DAI-Labor, Feb. 2008. http://www.dai-labor.de.
-
Technical Report TUB-DAI
-
-
Schmidt, A.1
Albayrak, S.2
-
24
-
-
42549166924
-
Security aspects of mobile phone virus: A critical survey
-
D.-H. Shih, B. Lin, H.-S. Chiang, and M.-H. Shih. Security aspects of mobile phone virus: a critical survey. Industrial Management & Data Systems, 108:478-494, 2008.
-
(2008)
Industrial Management & Data Systems
, vol.108
, pp. 478-494
-
-
Shih, D.-H.1
Lin, B.2
Chiang, H.-S.3
Shih, M.-H.4
-
25
-
-
77950124284
-
Spyware.FlexiSpy
-
Mar
-
Symantec. Spyware.FlexiSpy, Mar. 2006.
-
(2006)
-
-
Symantec1
-
26
-
-
33750436929
-
About malicious software in smartphones
-
S. Töyssy and M. Helenius. About malicious software in smartphones. Journal in Computer Virology, 2(2):109-119, 2006.
-
(2006)
Journal in Computer Virology
, vol.2
, Issue.2
, pp. 109-119
-
-
Töyssy, S.1
Helenius, M.2
-
27
-
-
66349131932
-
Understanding the spreading patterns of mobile phone viruses
-
April
-
P. Wang, M. C. Gonzalez, C. A. Hidalgo, and A.-L. Barabasi. Understanding the spreading patterns of mobile phone viruses. Science, pages 1167053+, April 2009.
-
(2009)
Science
-
-
Wang, P.1
Gonzalez, M.C.2
Hidalgo, C.A.3
Barabasi, A.-L.4
|